News Compilation - Websites Hacked by ISIS sympathizers 2015-2017
In the spring and summer of 2015, several hundred websites in North America were hacked by an islamic group named "Team System Dz". This group is based in Algeria and they made bold claims of support for ISIS and expressed their hatred of America, France and Israel. The hack was a header added to a website home page or a complete replacement of a website home page. The hack was pro islamic and pro ISIS text and included either audio, or an embedded media player with a pro islamic message. The websites effected ranged from small business to college and municipal websites and even police and military websites. Websites in both the U.S. and Canada were targeted.
Now, in autumn of 2017, several hundred school websites have been hacked across America by this same group: "Team System Dz". HackNews.mp4 is a small sample of just 25 news stories that detail the scope of this obnoxious hack and the trouble it has caused many in Canada and the U.S. Most of the news stories are from the hack in 2015. A few of the news stories are from late 2017.

Hacking Driverless Vehicles by Zoz Cannytrophic Design
Are driverless vehicles ripe for the hacking? Autonomous and unmanned systems are already patrolling our skies and oceans and being tested on our streets and highways. All trends indicate these systems are at an inflection point that will show them rapidly becoming commonplace. It is therefore a salient time for a discussion of the capabilities and potential vulnerabilities of these systems.
This session will be an informative and light-hearted look at the current state of civil driverless vehicles and what hackers or miscreants might do to mess with them. Topics covered will include common sensors, decision profiles and their potential failure modes that could be exploited. With this talk Zoz aims to both inspire unmanned vehicle fans to think about robustness to adversarial and malicious scenarios, and to give the paranoid false hope of resisting the robot revolution. He will also present details of how students can get involved in the ultimate sports events for robot hacking, the autonomous vehicle competitions.
Zoz is a robotics interface designer and rapid prototyping specialist. He is a co-founder of Cannytrophic Design in Boston and CTO of BlueSky in San Francisco. As co-host of the Discovery Channel show 'Prototype This!' he pioneered urban pizza delivery with robotic vehicles, including the first autonomous crossing of an active highway bridge in the USA, and airborne delivery of life preservers at sea from an autonomous aircraft. He also hosts the annual AUVSI Foundation student autonomous robot competitions such as Roboboat and Robosub.
Materials:
https://www.defcon.org/images/defcon-21/dc-21-presentations/Zoz/DEFCON-21-Zoz-Hacking-Driverless-Vehicles.pdf

Why is Sherlock so bad? Harris Bomberguy is on the case!
This version of the video has been slightly edited to get around the BBC's automatic video-blocking stuff.
My Twitter: https://twitter.com/hbomberguy
My Patreon: https://www.patreon.com/Hbomb
CREDITS:
Written by Harris Bomberguy and Sara Ghaleb
Voiced + Edited by Harris Bomberguy
Music:
The Usual Incompetech
The Final Fantasy Mystic Quest OST (it's a good game, shut up, I will destroy you)
Passions Hi-Fi

SPOILER ALERT: Stephen doesn't know how to do a spoiler alert.
Subscribe To "The Late Show" Channel HERE: http://bit.ly/ColbertYouTube
For more content from "The Late Show with Stephen Colbert", click HERE: http://bit.ly/1AKISnR
Watch full episodes of "The Late Show" HERE: http://bit.ly/1Puei40
Download the Colbert App HERE: http://apple.co/1Qqgwk4
Like "The Late Show" on Facebook HERE: http://on.fb.me/1df139Y
Follow "The Late Show" on Twitter HERE: http://bit.ly/1dMzZzG
Follow "The Late Show" on Google+ HERE: http://bit.ly/1JlGgzw
Watch The Late Show with Stephen Colbert weeknights at 11:35 PM ET/10:35 PM CT. Only on CBS.
Get the CBS app for iPhone & iPad! Click HERE: http://bit.ly/12rLxge
Get new episodes of shows you love across devices the next day, stream live TV, and watch full seasons of CBS fan favorites anytime, anywhere with CBS All Access. Try it free! http://bit.ly/1OQA29B

Michael Hayden, ex-NSA CIA chief, has some interesting things to say about Edward Snowden supporters and hackers and their ability to get girls...
This clip from the Majority Report, live M-F at 12 noon EST and via daily podcast at http://Majority.FM
Subscribe to us on YouTube: http://youtube.com/user/SamSeder

STATEMENT OF ADMINISTRATION POLICY
EXECUTIVE OFFICE OF THE PRESIDENT
OFFICE OF MANAGEMENT AND BUDGET
WASHINGTON, D.C. 20503
S. 1867 -- National Defense Authorization Act for FY 2012
(Sen. Levin, D-MI)
http://www.govtrack.us/congress/billtext.xpd?bill=s111-3081
S 3081, Indefinite detention, habeas corpus, posse comitatus, Enemy Belligerent Interrogation Detention Prosecution Act, judge napolitano, freedom watch, john mccain, carl levin, lindsey graham, rand paul, military, arbitrary arrest, us citizen, battlefield, prepper, food storage, weatherproof ammo, suspected terrorist,
http://smargus.com/wp-content/uploads/2010/03/s3081_indefinite_detention_act_...
http://www.dakotavoice.com/2010/10/s-3081-and-john-thune-national-security-tr...
http://www.youtube.com/redirect?q=http%3A%2F%2Fwww.reddit.com%2Fr%2Fannouncem...
http://www.youtube.com/watch?v=rHb83VNijBM
http://www.aclu.org/blog/national-security/senators-demand-military-lock-amer...
http://www.whitehouse.gov/sites/default/files/omb/legislative/sap/112/saps186...
http://www.washingtonpost.com/politics/congress/senate-panel-pushes-ahead-wit...
https://secure.aclu.org/site/Advocacy?cmd=display&page=UserAction&id=...
http://www.youtube.com/watch?v=aM3aJix6-90
Thank you for contacting me regarding the new provisions for detainees proposed in Sections 1031 and 1032 of S. 1253, the National Defense Authorization Act (NDAA) for Fiscal Year 2012. I welcome your thoughts and comments.
Section 1031 of the NDAA establishes guidelines to allow U.S. Armed Forces to detain "covered persons" captured during hostilities as unprivileged enemy combatants, pending disposition under the laws of war. The provision defines a "covered person" as a person who planned, authorized, committed, or aided the terrorist attacks of September 11, 2001. This provision also applies to individuals who support al Qaeda, the Taliban, or associated forces that are engaged in hostilities against the United States or its coalition partners.
Section 1032 requires U.S. Armed Forces to hold in custody as an unprivileged enemy combatant any person who is a member or part of al Qaeda or an affiliated entity, and who participated in planning or carrying out an attack or attempted attack against the United States or its coalition partners. The requirement does not extend to citizens of the United States. Also, the Secretary of Defense is authorized to waive required detention.
S. 1253 has passed the Senate Armed Services Committee, and is currently awaiting consideration by the full Senate. Should this legislation be brought to the Senate floor, you may be certain that I will keep your views in mind.
I appreciate hearing from you, and I hope that you will not hesitate to contact me on any issue that is important to you.
Sincerely,
Kay Bailey Hutchison
United States Senator
284 Russell Senate Office Building
Washington, DC 20510
202-224-5922 (tel)
202-224-0776 (fax)
http://hutchison.senate.gov"

Cyberwarfare is politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare.
This video is targeted to blind users.
Attribution:
Article text available under CC-BY-SA
Creative Commons image source in video

HyperNormalisation is a 2016 BBC documentary by British filmmaker Adam Curtis. The film was released on 16 October 2016
The Power of Nightmares
https://archive.org/details/ThePowerOfNightmares-AdamCurtis
Bitter Lake
http://www.bbc.co.uk/iplayer/episode/p02gyz6b/adam-curtis-bitter-lake

http://www.ted.com Michael Shermer says the human tendency to believe strange things -- from alien abductions to dowsing rods -- boils down to two of the brain's most basic, hard-wired survival skills. He explains what they are, and how they get us into trouble.
TEDTalks is a daily video podcast of the best talks and performances from the TED Conference, where the world's leading thinkers and doers give the talk of their lives in 18 minutes. Featured speakers have included Al Gore on climate change, Philippe Starck on design, Jill Bolte Taylor on observing her own stroke, Nicholas Negroponte on One Laptop per Child, Jane Goodall on chimpanzees, Bill Gates on malaria and mosquitoes, Pattie Maes on the "Sixth Sense" wearable tech, and "Lost" producer JJ Abrams on the allure of mystery. TED stands for Technology, Entertainment, Design, and TEDTalks cover these topics as well as science, business, development and the arts. Closed captions and translated subtitles in a variety of languages are now available on TED.com, at http://www.ted.com/translate. Watch a highlight reel of the Top 10 TEDTalks at http://www.ted.com/index.php/talks/top10

The Syrian Electronic Army (SEA), is a group of computer hackers supervised by the Syrian Assad regime. Using spamming, defacement, malware (including the Blackworm tool), phishing, and denial of service attacks, it mainly targets political opposition groups and western websites including news organizations and human rights groups. The Syrian Electronic Army claims to be "a group of enthusiastic Syrian youths who could not stay passive towards the massive distortion of facts about the recent uprising in Syria", however the SEA is believed by experts to be "a state-supervised operation" that is linked to the Assad regime. The SEA is thought to be the first public, virtual army in the Arab world to openly launch cyber attacks on its opponents.
This video is targeted to blind users.
Attribution:
Article text available under CC-BY-SA
Creative Commons image source in video

Beshara Doumani (Director, Middle East Studies Program, Brown University)
Neve Gordon (Ben Gurion University of the Negev), Nicola Perugini (Brown University)
Bruce Cronin (CUNY): Shielding Attackers from Responsibility: The Exploitation of Passive Precaution in Asymmetrical Conflicts
Banu Bargu (New School): Bodies against War, Bodies at War: Human Shielding as a Practice of Resistance
About the Workshop
In this workshop scholars and human rights experts will discuss the role of human shielding in warfare and to analyze the way international humanitarian law (IHL) treats this increasingly significant phenomenon. Human shielding involves the use of persons protected by IHL, such as prisoners of war or civilians, to deter attacks on combatants or military sites. Placing civilians on train tracks, in airports or in any site that is considered to be a legitimate military target of the enemy army in order to prevent the latter from striking is illegal according to IHL. Along similar lines, carrying out military operations from within civilian spaces, particularly schools, hospitals, religious sites, civilian neighborhoods and even industrial areas is considered illegal. Article 28 of the Fourth Geneva Convention states that, “The presence of a protected person may not be used to render certain points or areas immune from military operations.”
The 1977 Additional Protocol I to the Convention elaborates on the prohibitions of using human shields, while the 1998 Rome Statute of the International Criminal Court characterized human shielding as a war crime.
Considering that urban settings are rapidly becoming the most prominent arenas of contemporary warfare, the significance of the human shield clauses in international law cannot be overstated. Urban areas, as Stephen Graham put it, “have become the lightning conductors for our planet’s political violence,” while “warfare strongly shapes quotidian urban life.” The permeation of organized, political violence within and through cities renders human shielding a ubiquitous phenomenon, since practically all fighting within a city involves human shields in some form or another. In other words, urban warfare inevitably produces an overlapping between the noncombatant and combatant and between civilian and military architectural edifices and artifacts. But since the non-combatant and the civilian are protected according to IHL this overlapping creates a problem for liberal regimes, which insist on the legality of their actions in order to underscore the ethics of the violence they deploy.
Bringing together human rights experts (both from academia and leading NGOs), legal scholars, political scientists, historians and anthropologists this two-day workshop aims to discuss, debate and analyze three central issues. First, we intend to examine the legal history of human shielding, when it was first introduced into international law, what spurred its introduction, and how the legal concept has developed over the years. Second, the workshop aims to examine different conflicts—Iraq, ex-Yugoslavia, as well as Israel and Palestine—in order to assess and analyze similarities and differences both in the way human shields were used and the discursive response to their deployment. It is within this context that we will also discuss the difference between voluntary and involuntary human shields. Finally, we propose to connect the case studies to international law and ask whether the way international law treats human shielding is adequate given some of the changes in modern warfare.
The workshop on human shields and international law is not only pertinent to security and governance but also deals with an issue that, on the one hand, has been dealt with to a very limited extent both within academia and among human rights groups, and, on the other hand, the use of human shields is becoming more pervasive.
Organized by Nicola Perugini, Mellon Postdoctoral Fellow in Italian Studies and Middle East Studies, and Neve Gordon, Department of Politics and Government, Ben-Gurion University of the Negev, and Middle East Studies | Brown.
Co-sponsored by the Watson Institute.

This update method can be used if your PS4™ system is not connected to the Internet. Download the update file to your computer, and then save it on a USB storage device. Copy the saved file to the system storage of your PS4™ system to update the system.
Update using the Internet.
The following things are needed to perform the update:
PlayStation ® 4 system Internet connection (wired or wireless) Before using the network update feature, you must configure your PS4™ systemDriver asuss network settings. For details, refer to the userDriver asuss guide for your PS4™ system.
From the function screen, select (Settings) > [System Software Update] to make sure your system has the latest version of the system software. You can continue to use your system while downloading. If there is an update file for a later version, it automatically downloads. When downloading is complete, a notification message appears in the upper left corner of the screen. Select the message under (Notifications) while viewing the function area, and then follow the on-screen instructions to perform the installation.

Update using a disc.
The following things are needed to perform the update:
PlayStation ® 4 system A disc that contains an update file.
When you play a disc that contains a later version of the system software, a screen appears to guide you through the update process. Follow the on-screen instructions to perform the update.
Update using a computer.
For the standard update procedure, follow the steps below. Visit here for the procedure to initialize your PS4™ system and perform a new installation of the system software, such as for when you replace the hard disk drive.
The following things are needed to perform the update:
PlayStation ® 4 system Computer connected to the Internet USB storage device, such as a USB* flash drive * There must be approximately 460 MB of free space.
On the USB storage device, create folders for saving the update file. Using a computer, create a folder named "PS4". Inside that folder, create another folder named "UPDATE". Download the update file, and save it in the "UPDATE" folder you created in step 1. Save the file with the file name "PS4UPDATE.PUP". Click to start the download. Connect the USB storage device to your PS4™ system, and then from the function screen, select (Settings) > [System Software Update]. Follow the on-screen instructions to complete the update. If your PS4™ system does not recognize the update file, check that the folder names and file name are correct. Enter the folder names and file name in single-byte characters using uppercase letters.
Perform a New Installation of the System Software.
This procedure is for initializing your PS4™ system and performing a new installation of the system software, such as for when you replace the hard disk drive.
Be careful when using an update file for reinstallation. All users and all data will be deleted.
The following things are needed to perform the update:
PlayStation ® 4 system Computer connected to the Internet USB storage device, such as a USB* flash drive * There must be approximately 1.1 GB of free space.